0% found this document useful (0 votes)
49 views24 pages

18cse460t NDM Question Bank

NDM question bank

Uploaded by

Durga Devi P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views24 pages

18cse460t NDM Question Bank

NDM question bank

Uploaded by

Durga Devi P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

lOMoARcPSD|15963275

18CSE460T NDM Question Bank

Network Design And Management (SRM Institute of Science and Technology)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

SRM I N S T I T U T E O F S C I E N C E A N D T E C H N O L O G Y
Ramapuram Campus, BharathiSalai, Ramapuram, Chennai - 600089

FACULTY OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF COMPUTERSCIENCE AND ENGINEERING

QUESTIONBANK

DEGREE / BRANCH: B.TECH/COMPUTER SCIENCE AND ENGINEERING


VII-SEMESTER

18CSE460T/NETWORK DESIGN AND MANAGEMENT

Regulation–2018

Academic Year:2021-2022

Downloaded by Durga Devi P ([email protected])


lOMoARcPSD|15963275

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


Ramapuram Campus, Bharathi Salai, Ramapuram, Chennai-600089
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
B.TECH/COMPUTER SCIENCE AND ENGINEERING

QUESTIONBANK

SUBJECT : 18CSE460T/NETWORK DESIGN AND MANAGEMENT


YEAR/SEM: IV/VII
Course Outcomes
CO1: Understand the various type of Networks and the Network Management basics
CO2: Understand the Network Management Standards
CO3: Understand the working of Simple Network Management Protocol and its various versions
CO4: Understand the working of Remote Monitoring
CO5: Understand the Network Management Applications

UNIT-I
Telephone Network Management-Distributed Computing Environment-TCP/IP Based Networks-Communication
Protocols and Standards-Protocol Layer and Services-Challenges of IT Managers-Network Management- Network
and System Management-Network Management System Platform-Current status and future of Network
Management -Network Management Standards-Network Management Model - Organizational model-Information
Model-Management Information Trees-Communication Model, ASN.1-Terminology-Symbols and Conventions-
Functional Model.
PART-A (Multiple Choice Questions)
Q. Questions Course Competence
No Outcome BT Level
1 Which technique is based on compile-time program transformation
for accessing remote data in a distributed-memory parallel system?
a) cache coherence scheme
b) computation migration
c) remote procedure call
d) message passing CO1 BT1
Answer:
b) computation migration
2 Logical extension of computation migration is ___________
a) process migration
b) system migration CO1
c) thread migration BT1
d) data migration
Answer:
a) process migration
3 In distributed systems, link and site failure is detected by
___________
CO1 BT1
a) polling
b) handshaking
c) token passing
d) none of the mentioned
Answer:
b) handshaking
4 Internet provides _______ for remote login.
a) telnet
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

b) http
c) ftp CO1 BT1
d) rpc
Answer:
a) telnet
5 Which of the following statements could be valid with respect to the
ICMP (Internet Control Message Protocol)?
It reports all errors which occur during transmission.
A redirect message is used when a router notices that a packet seems CO1 BT3
to have been routed wrongly.
It informs routers when an incorrect path has been taken
The "destination unreachable" type message is used when a router
cannot locate the destination.
Answer:
(b) A redirect message is used when a router notices that a packet
seems to have been routed wrongly.
6 When the mail server sends mail to other mail servers it becomes ___
?
a.SMTP client
b.SMTP server CO1
c.Peer BT1
d.Master
Answer:
a) SMTP client

7 How many versions available of IP?


6 version
4 version CO1
2 version BT1
1 version
Answer:
(c) 2 version

8 Which layer of the TCP / IP stack corresponds to the OSI model


transport layer?
Host to host CO1
Application BT2
Internet
Network Access
Answer:
(a) Host to Host
9 Which of the statement is correct with regard to Time Division
Multiplexing (TDM) and its variants?
CO1 BT1
Statistical TDM makes efficient use of the bandwidth only if the
arrival pattern of the data stream is probabilistic.
TDM requires the transmitter and receiver to be synchronized
periodically.
TDM performs efficiently if the arrival pattern of the data stream is
probabilistic.
Statistical TDM is efficient if the data stream is deterministic.
Answer:
(a) and (b)
10 In specific, if the systems use separate protocols, which one of the
following devices is used to link two systems?
Repeater
Gateway BT1
Bridge CO1
Hub
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

Answer:
(b) Gateway
11 The correct order of corresponding OSI layers for having
functionalities of routing and reconciling machine representation
differences with shared access resolution and ASCII test protocol is?
Network, Physical, Transport, Data link
Network, Physical, Data link, Application BT1
Network, Presentation, Data link, Application CO1
Network, Presentation, Physical, Transport
Answer:
(c) Network, Presentation, Data link, Application
12 Distributed pervasive system is also known as
a.Ubiquitous computing
b.User Interface design CO1
c.Graphical User interface BT1
d.peer to peer system
Answer:
a.Ubiquitous computing

13 Type of cluster computing is


a.Load sharing cluster
CO1
b.Load holding cluster
c.Load replication cluster BT1
d.Load balancing cluster
Answer:
d.Load balancing cluster
14 Scaling transparency hides
a.System expansion
b.System collaboration CO1
c.System failure BT1
d.System security
Answer:
a.System expansion
15 Transient communication done by_____ layer
a.Network
b.Transport CO1
c.Physical BT1
c.Session
Answer:
b.Transport
16 Which address is used to identify a process on a host by the transport
layer? a.physical address
b.logical address CO1
c.port address
d.specific address BT1
Answer:
c.port address
17 The application-level protocol in which a few manager stations
control a set of agents is called ______
CO1 BT3
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
Answer:
c) SNMP
18 Configuration management can be divided into which two
subsystems?
CO1
a) Reconfiguration and documentation
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

b) Management and configuration BT1


c) Documentation and dialing up
d) Configuration and dialing up
Answer:
a) Reconfiguration and documentation
19 In Network Management System, the division that is responsible for
controlling access to network based on a predefined policy is called
_________ CO1
a) Fault Management BT1
b) Secured Management
c) Active Management
d) Security Management
Answer:
d) Security Management
20 Control of the users’ access to network resources through charges is
the main responsibility of ________
a) Reactive Fault Management CO1
b) Reconfigured Fault Management BT2
c) Accounting Management
d) Security Management
Answer:
c) Accounting Management
21 _____ is a process that prevents multiple threads or processes from
accessing shared resources at the same time.
a.Critical section
b.Deadlock Message passing CO1 BT1
c.Mutual Exclusion
d.Mutual Exclusion
Answer:
d.Mutual Exclusion

22 The protocol data unit (PDU) for the application layer in the Internet
stack is
Segment CO1
Datagram BT1
Message
Frame
Ans: C. Message

23 Bridge works in which layer of the OSI model?


A. Application layer
B. Transport layer BT1
C. Network layer CO1
D. Data link layer
Ans: D. Data link layer

24 Why IP Protocol is considered as unreliable?


A. A packet may be lost
B. Packets may arrive out of order CO1 BT1
C. Duplicate packets may be generated
D. All of the above
Ans: D. All of the above

25 What is the use of Ping command?


A. To test a device on the network is reachable
B. To test a hard disk fault CO1
C. To test a bug in an Application BT1
D. To test a Pinter Quality
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

Ans: A. to test a device on the network is reachable

1 Demonstrate UDP sockets. CO1 BT2

2 How are system calls used with sockets? CO1


BT2
3 What are the ways to address the framing problem? CO1 BT1

4 Summarize multicasting? CO1 BT2

5 What are the advantages of using UDP over TCP? CO1 BT2

6 Compare bit rate and baud rate. CO1 BT1

7 What are the conversions in byte ordering? CO1 BT2

8 Define SCTP sockets. CO1 BT2

PART C (12 Marks)


1 Analyze the Challenges of IT Managers in order to Improve the CO1 BT2
performance of the Network
2 Correlate the information model with the real-time Information CO1
system.

BT2
3 Describe the Function of Communication model in the TCP/IP CO1 BT2
protocol suit
4 Explain the role of the Manager and Agent in the organization model CO1
BT2
5 Explain about TCP sockets in detail. CO1 BT1

UNIT-II
Introduction to SNMP, SNMP v1 model-Organization Model-System overview-SNMP v1 Information model-
Structure of Management Information Managed Objects-MIB-Object Group-System Group, Interfaces Group-
Address Translation group-IP Group- ICMP Group-TCP Group-UDP Group-SNMP v1Communication model-
Functional model SNMPv2- System Architecture, MIB Protocol- SNMPv3 Architecture and Applications-MIB
User Based Security Model-Access Control.
PART-A (Multiple Choice Questions)
Q. Questions Course Competence
No Outcome BT Level
1 Which one of the below is not the goal of the architecture in the original
specification of SNMP?
1. minimize the number and complexity of management function
2. flexible for future expansion
3. independent of architecture and mechanism of particular host and CO2 BT1
gateways
4. monitor the network objects
Ans : monitor the network objects
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

2 SNMP three basic messages


1. said, get, trap
2. next gen, res, rep
3. post, rep, res
4. set, res, post CO2
BT1
Ans: 1. said, get, trap

3 SNMP messages are exchanged using __________ protocol?


1. UDP
2. TCP CO2
3. STCP BT1
4. FTP
Ans: 1.UDP
4 The major part of SNMP v2 divided into
1. module definition, object definition and trap definition
2. message definition, connection process, data transfer process
3. function definition, error deduction, error recovery
4. network monitoring, message passing, connection termination CO2

Ans:1. module definition, object definition and trap definition BT1

5 What are the three sub-modules SNMPv2 contains?


1. SNMP Domains, SNMP Proxys, SNMP Sub-Modules
2. SNMP Domains, SNMP Proxys, SNMP Modules
3. SNMP Domains, SNMP Modules, SNMP Sub-Modules
4. SNMP Proxys, SNMP Modules, SNMP Sub-Modules CO2 BT1

Ans:SNMP Domains, SNMP Proxys, SNMP Sub-Modules

6 Which macro-TYPE had been made absolute in SNMP 2?


1. TRAP
2. Rep
3. Post CO2 BT1
4. Get

Ans: TRAP

7 The SNMP trap group contains information on the ______________


identifiers of the trap responsible to send the trap?
1. Object CO2 BT1
2. Router
3. HUB
4. Source
Ans:Object

8 Get-bulk request is an enhancement of ___________request and retrieves


the data in bulk efficiently?
1. Get-next
2. Trap CO2 BT1
3. Trap-Type
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

4. Next-gen
Ans:Get-next

9 The ____ field in the SNMP PDU is an offset that points to the variable
in error
1) Community BT1
CO2
2) Enterprise
3) Error index
4) Enterprise and Community
Ans:3. Error index
10 To name objects globally, SMI uses an object identifier, Which is a
hierarchical identifier based on a ________ Structure
1.linear
2.tree CO2 BT1
3.graph
4.stack
Ans: 2.tree
11 All objects managed by SNMP are given an object identifier the object
always starts with ____
a)1.3.6.1.2.1
b)1.3.6.1.2.2
c)1.3.6.1.2.3
d)2.3.6.1.2.3 CO2 BT1
Ans: a)1.3.6.1.2.1
12 To define the data type, SMI uses fundamental ______ definitions and
adds some new definitions.
a)AMS.1 CO2 BT1
b)ASN.1
c)ASN.2
d)ASN.3
Ans:ASN.1
13 SMI has two broad categories of data type: ___ and ____
a) Simple; complex
CO2 BT3
b) Simple; Structured
c) Structured; unstructured
d)Simple ; Complex
Ans: b) Simple; Structured
14 SMI defines two structure data types: ______ and _____
a) Sequence; atomic
b)Sequence; Sequence of
c) a sequence of; array
d)List; atomic
Ans: )Sequence; Sequence of
CO2 BT3
15 The _______ordering enables a manager to access a set of variables one
after another by defining the first variable
1. lexicographic
2.linear
3.non linear
4.tree CO2 BT1
Ans:1. lexicographic

16 The GetRequest PDU is sent from the _____ to the _____ to retrieve the
value of a variable or a set of variables
1. Client; server CO2 BT1
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

2.Server;client
3.server; network
4.router; client
Ans:Client; server
17 Which one of the SNMP tool is used to Monitor the network traffic
1)Multi Router Traffic Grapher (MRTG)
2)tcpdump
3)Protocol analyser
4) SNMP Sniff
Ans:1)Multi Router Traffic Grapher (MRTG)

CO2 BT3
18 SNMP uses the services of UDP on two well-known ports,______ and
___
1)161;162
2)160;161
3)160;162
4)150:151 CO2 BT1
Ans:1)161;162

19 ____ runs the SNMP client program:___ runs the SNMP server program
1)A Manager; A Manager
2)An Agent: An Agent CO2
3)A manager; An Agent BT1
4)An Agent; a Manager
Ans:3)A manager; An Agent

20 Which is the Manager duty


1) Retrieve the value of an object defined in an agent
2) Store the Value of an object defined in an agent CO2
3) Retrieve and Store the Value of an object defined in an agent BT1
4)Manipulate the value of an object defined in an agent
Ans:3) Retrieve and Store the Value of an object defined in an agent

21 An SNMP Agent can Send _____ message


1) Response
2) GetRequest
3) SetRequest CO2 BT1
4)Get and Set Request
Ans:1) Response

22 Which macro-TYPE had been made absolute in SNMP 2?


1. TRAP
2. Rep CO2 BT1
3. Post
4. Get
Ans:TRAP

23 What are the major part of SNMP v2 contains?


a. Module definition, object definition and trap definition CO2 BT1
b. Message definition, connection process, data transfer process
c. Function definition, error deduction, error recovery
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

d. Network monitoring, message passing, connection


termination
Ans:Module definition, object definition and trap definition
24 What are the three sub-modules SNMPv2 contains?
a. SNMP Domains, SNMP Proxys, SNMP Sub-Modules
b. SNMP Domains, SNMP Proxys, SNMP Modules CO2 BT1
c. SNMP Domains, SNMP Modules, SNMP Sub-Modules
d. SNMP Proxys, SNMP Modules, SNMP Sub-Modules
Ans:a. SNMP Domains, SNMP Proxys, SNMP Sub-Modules

25 Which one of the below is not the goal of the architecture in the
original specification of SNMP?
a. Minimize the number and complexity of management CO2 BT1
function
b. Flexible for future expansion
c. Independent of architecture and mechanism of particular host
and gateways
d. Monitor the network objects
Ans:d. Monitor the network objects

PART B (4 Marks)
1 Discuss how Functional model is differ from the Communication model CO2 BT1

2 How would you determine the IP address of the local router? CO2 BT1

3 Discuss the organization model of SNMPv2 CO2 BT1

4 Differentiate the TCP and UDP group CO2 BT1

5 List the IP Group protocols CO2 BT2

6 Discus how ICMP Group protocols send the error messages CO2 BT1

7 Explain the Access Control in the network CO2 BT2

8 Discuss the SNMP V3 Architecture CO2 BT1

PART C (12 Marks)


1 CO2 BT2

2 Explain the SNMPv1Communication model CO2 BT2

3 Discuss the SNMPv2 protocol operations CO2 BT1

4 Discuss about the SNMPv3 message format CO2 BT2

5 Explain the concept of Address translation group CO2 BT2

UNIT-III
Remote Monitoring, RMON SMI and MIB-RMON1, RMON2-System Utilities for Management, Tools-Network
Statistics Measurement Systems, Traffic Load-Protocol Statistics, Data and Error Statistics-Network Management
System, Components, Requirements System Management, Network Management Applications-Configuration
Management, Inventory Management -Performance Management Tools
PART-A (Multiple Choice Questions)

Downloaded by Durga Devi P ([email protected])


lOMoARcPSD|15963275

Q.No Questions Course Competence


Outcome BT Level
1 Which state describes Row is not fully active in the Entry status
data type in RMON1
a. Create request CO3 BT1
b. Invalid
c. UnderCreation
d. valid

2 The __________stores statistics on the conversation between pair


of hosts.
a. Event Group CO3 BT1
b. Matrix Group
c. Filter Group
d. Statistics Group

3
Which Counts the amount of traffic sent between each pair of
discovered network addresses in RMON2 Group
CO3 BT1
a. alHost
b. nlMatrix
c. probeconfig
d. protocolDist

4
The nslookup status monitoring tool is used to___________
a. Looks up DNSfor name-IP address translatlon CO3
BT1
b. Queries DNSserver
c. Obtains and conflgures networking interface. Parameters
d. Displays Information on Internet hosts/domains

5
Name the traffic monitoring Graphical tool to capture,to lnspect
and to save Ethernet packets
CO3
BT1
a. wireshark
b. getethers
c. iptrace
d. bing

6
Load statistics in an IP network can obtained by measuring IP
packets in the __________________level
CO3 BT1
a. Network layer
b. Application layer
c. Presentation layer
d. Session layer

7
A __________ is a logical circuit between two switching offices
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

and it traverses over many facilities


CO3 BT1
a. Trunk
b. Service Legal Agreement (SLA)
c. Equipment
d. ipaddr
8
The switches are ___________in virtual-circuit concept in
Network Provisioning Process.
a. Cell based
CO3
b. Frame based BT1
c. Both cell and Frame
d. Slot based

9
Which management is normally used in the context of discovering
network topology
a. Configuration Management CO3
BT1
b. Inventory Management
c. Performance Management
d. Fault Management

10
Name the tool which is used to collect the traffic Statistics over a
period of time.
a. Multi Router Traffic Grapher BT1
CO3
b. Multi Packet Traffic Grapher
c. Remote Router Circuit Grapher
d. Remote Path circuit Grapher

11
The utilization factor in performance Management can be defined
in terms of
a. Collision rate BT1
CO3
b. Transmission rate
c. Error rate
d. Recovery Rate

12
Which algorithm controls the bandwidth of the access to the
service provider network.
a. Token Bucket CO3
BT1
b. Token Ring
c. Hop count
d. Protocoladdr

13
The RMON1 statistics function provides_____________-
a. Link level statistics CO3
BT1
b. Collects periodic statiscal data and stores for later retrieval
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

c. Generates events when the data sample gathered crosses


pre-established thresholds
d. Gathers statistical data on host

14
Which group provides informaton on the conversation between
pairs of hosts in both directions in RMON2 .
CO3 BT1
a. network- layer matrlx group
b. network-layer host group
c. Application - layer matrlx group
d. Application - layer host group

15
Which of the following is basic group and mandatory in RMON2
MIB Groups
CO3 BT1
a. rmon1EthernetEnchancementGroup
b. rmon1TokenRingEnchancementGroup
c. probeconfigurationGroup
d. a1HostGroup

16
The Traffic monitoring tool ‘ping’ is used for
a. Measuring round-trip packet loss CO3
BT1
b. Measures point-to-point bandwidth of a link
c. Measures performance of Gateways
d. Measures host addresses of an Ethernet LAN segment

17
Latency is caused by________
CO3 BT1
a. Retention in large bandwidth signal
b. Dispersion in large bandwidth signal
c. Retention in large propagation rate
d. Dispersion in low propagation rate

18
.Network Provisioning is a part of_________-
a. Inventory Management
b. Fault Management BT1
CO3
c. Configuration Management
d. Performance Management

19
Which command helps to discover network component that
responds with an ipaddress
CO3
BT1
a. arp
b. rap
c. ipr
d. ipn

Downloaded by Durga Devi P ([email protected])


lOMoARcPSD|15963275

20
Legacy inventory management system uses__________based
database systems
CO3 BT1
a. Non-hierarchial
b. Scalar
c. Relational
d. Non-scalar

21
The utilization factor can be defined in terms of_____________
a. Collision rate
b. Error rate
c. Peak load rate CO3 BT1
d. Throughput

22
Choose the metrics to measure the application responsiveness in
performance management
CO3 BT1
I. Response time
II. Burst frame rate
III. Auto recovery time
IV. Round trip time

a. Only III
b. I and II
c. I and IV
d. I and III

23
RMON2 works on____________
a. Physical Layer
b. Data Link Layer
CO3
c. Network layer BT1
d. Both a and b

24
.___________is used in automated circuit provisioning of trunks.
a. Trunk Integrated Record Keeping System CO3
BT1
b. Circuit Integrated Record Keeping System
c. Equipment Inventory system
d. Facilities inventory system

25 BT1
Name the group which is useful in tracking the overall trend in the CO3
volume of traffic in RMON1
a. Statistics group
b. History group
c. Host group
Alarm group Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

C
PART B (4 Marks)
1 CO3 BT1
Write about RMON and list out its advantages
2 CO3 BT2
List out the tools used in network management systems
3 CO3 BT2
Give some applications of network management systems
4 CO3 BT2
Write short notes about Network provisioning
5 CO3 BT1
Discuss about the Traffic Load Monitoring in Network statistics
Measurement systems
6 CO3 BT1
Write about the basic configuration of a Protocol Analyzer
7 CO3 BT1
Describe about RMON1 Textual conventions
8 CO3 BT2
Write about RMON2 Conformance specification

PART C (12 Marks)


1 CO3 BT2
Explain in detail about System utilities for Management and Tools
2 CO3 BT2
Write in detail about Configuration management and Inventory
Management
3 CO3 BT2
Describe about RMON1 common and Ethernet groups
4 CO3 BT1
Discuss about Performance Management in Detail
5 CO3 BT2
Explain about RMON1Groups and Functions with the neat sketch

UNIT-IV
Network Management Applications, Fault Management Architecture-Fault location -Fault isolation Algorithm Self-
healing-Avoiding failures-Configuration setting- Configuration discovery and Change Control
Configuration Management Applications- Patch Management-Approaches for Performance Management-
Performance Monitoring and Reporting-Performance trouble shooting-Capacity Planning-Account Management-
Report Management-System and User Reports- Policy Management, Service Level Management
PART-A (Multiple Choice Questions)
Q. Questions Course Competence
No Outcome BT Level
1 Configuration Management can be divided into two subsystems:
Reconfiguration and
a. Documentation
b. Security CO4 BT1
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

c. Accounting
d. Performance
2 Based on the performance policy of network management,
BT1
Controlling access to the network is the task of CO4
a. Fault Management
b. Performance Management
c. Activation Management
d. Security management
3 Performance Management is closely related to
a. Risk management
b. Fault Management BT1
c. Security Management CO4
d. Configuration Management
4 Network provisioning System Also Called as
a. Circuit Provision system
b. Feed Back provision System CO4
c. Planning System BT1
d. Designing System
5 Fault Management Involves
1. Fault Detection
2. Fault location
3. Restoration of service & Problem Resolution CO4 BT1
4. Identification of Root problem

a.1,2 &3
b.1,2 & 4
c.1,2,3&4
d.1,2 &4
6 Fault detection is accomplished using ---------
a. Polling Scheme
b. SNMP BT1
c. NMS
CO4
d. RMON
7 RFC 2063 defines
a. Reporting of network Traffic
b. Reporting of network Fault
c. Reporting of network Error BT1
CO4
d. Reporting of network Failure
8 Which one of the following is not the Event Correlation techniques
a. Rule-based reasoning
b. Model-based reasoning
c. Case-based reasoning BT1
CO4
d. Inference Based reasoning
9 9.Accounting Management is useful for identifying Hidden cost with
the help of
a. RMON BT1
b.SNMP CO4
c.NMS
d.ICMP
10 Which one of the following is not the basic guidelines to setting up
policies and procedures of NDM
a. Identify what you are trying to protect CO4 BT1
b. Determine the network components
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

c. Implement measures which will protect your assets In a cost-


effective manner
d. Review the process continuously and make improvements to each
item if a weakness is found
11 Which of the following is part of a static view of information?
a. Logical data model
b. Meta data CO4
c. Data flow model
BT1
d. Information process model
12 What should not be part of an acceptable use policy?
a. Allowable use of systems
b. Legal obligations
c. Encryption policies
CO4 BT1
d. User responsibilities
13 The general transformation cycle for information is:
a. information to data to knowledge.
b. knowledge to data to information.
c. data to knowledge to information. CO4
BT1
d. data to information to knowledge.
14 System Management ensures that
a. product’s risk is assessed
b. product’s feasibility is assessed CO4
c. system is developed at minimum cost BT1
d. Product’s Durability
15 The deliverable of the problem analysis phase is
a. system improvement objectives
b. problem statement CO4
c. statement of constraints BT1
d. statement of work
16 Capacity planning
a.Requires detailed system performance information
b.It is independent of the operating system
c.It does not depend on the monitoring tools available CO4
BT1
d.It is not needed in small installations
17 What is the relation of the capacity attribute to performance?
a) same
b) different CO4
c) similar BT3
d) none of the mentioned
18 Point out the wrong statement.
a) Network capacity is one of the easiest factors to determine
b) A system uses resources to satisfy cloud computing demands that
include processor, memory, storage, and network capacity CO4 BT3
c) Scaling a system can be done by scaling up vertically to more
powerful systems
19 6. Which of the following is one of the major categories of Amazon
Machine Instances that you can create on the Amazon Web Service?
a) WAMP CO4
b) XAMPP BT2
c) LAMP
d) LSeek
20 9. Which of the following is a critical step in capacity planning?
a) Predict the future based on historical trends and other factors
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

b) Load the system until it is overloaded


c) Deploy or tear down resources to meet your predictions CO4 BT3
d) Load sharing approach
21 A Network management system can be divided into ……..
a. Three categories
b. Five categories
CO4
c. Six categories BT1
d. Seven categories
22 MIB is a collection of group of object that can be managed by……
a. SMTP
b. UDP
c. SNMP CO4 BT3
d. TCP/IP
23 Which of the following networks supports pipeling effect
a. Circuit-switched networks
b. Message-switched networks CO4
c. Packet-switched networks BT1
d. Stream- switched networks
24 The entities of the network management System have an initial
configuration when the network is set up but can change with
a. Server
b. Time CO4 BT1
c. Entity
d. Proxy
25 In-Network Management System a large Network is usually made up
of Hundreds of
a. Domains
b. Protocols CO4
BT1
c. Entities
d. IP
PART B (4 Marks)
1 Discuss how Fault location can be identified in the network design CO4 BT2
2 Describe the Policy Management CO4 BT1
3 List the Network Management Applications CO4 BT1
4 Detail about the Configuration setting CO4 BT2
5 Describe about Fault isolation CO4 BT1
6 Discuss the Service Level Management CO4 BT2
7 How Self-healing process can be done in the Network topology CO4 BT1
8 Detail about the Report Management CO4 BT2

PART C (12 Marks)


1 Explain the Fault Management Architecture CO4 BT3
2 Discus about the Configuration discovery and Change Control CO4 BT1
3 Explain Patch Management CO4 BT2
4 Explain codebook matrix CO4 BT2
5 Explain Configuration Management Applications CO4 BT2

Downloaded by Durga Devi P ([email protected])


lOMoARcPSD|15963275

UNIT-V
Network Design and Planning- Network Design for Enterprise Network-Network Design Process,-Data Collection
Data Generation-Traffic Generators-Cost Generators,-Topology Architecture- Graph Link Algorithms-Network-Design
Techniques- Performance Analysis-Queuing Essentials- Loss and Delay-Reliability-Network Cost
PART-A (Multiple Choice Questions)
Q.No Questions Course Competence
Outcome BT Level
1 How many steps are required to design a network?
a. 7
b. 8
c. 2
d. 3 CO5 BT1
Ans: B
2 Which network design process stage involves determining the size of the
components used, the topology and cost of transmission?
a. Topological design CO5
b. Network-synthesis BT1
c. Network realization
d. Data Acquisition

Ans: B
3 _________models can be used at various phases of service and network
management life cycle such as service provision, optimization and CO5
monitoring. BT1
a. Data-Driven
b. Topological
c. Service
d. Network

Ans: A
4 ________based collection at network core devices is the most prevalent
data collection mechanism currently.
a. Packet
b. Log
CO5
c. Flow BT1
d. Service

Ans: C
5 The model that manages resources and presents the standard format
MOF.
a. CIM CO5
b. CIMOM BT1
c. XML API
d. Standard Module

Ans: A
6 In which of the following examples data generation is not involved:
a. Mobile Data
b. Internet CO5 BT1
c. Trading
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

d. Emotions

Ans: D
7 Which one is not a network traffic generator ?
a. Nping
b. Lping
c. NTGM
d. Trex CO5
BT1
Ans: B
8 TCP is reliable ?
a. True
b. False
CO5 BT1
Ans: A
9 Network Reliability is capacity of the network to offer ______ services
even during failure.
a. Different
b. Consistent
c. Same CO5 BT1
d. Uninterrupted

Ans: C
10 What is the cost of network security for small-sized network?
a. $(100-200)
b. $(200-300) CO5 BT1
c. $(300-400)
d. $(400-500)

Ans: A
11 Which is the best way to protect your organization’s cyber-
infrastructure?
a. Planned solution
b. Best security system
CO5 BT1
c. Thorough Network Security Solution
d. Research for solution

Ans: C
12 In Network Management System, maps track each piece of hardware
and its connection to the ___________
a. IP Server
b. Domain CO5 BT1
c. Network
d. Data
Ans: C
13 A network management system is a collection of _________for
network monitoring. CO5 BT1
a. Tools
b. Commands
c. Tasks
d. Components
Ans: A
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

14 The network control host includes a collection of software called the


____________
a. Network management agent (NMA).
b. Network Management Protocol (NMP) CO5 BT1
c. Management Information Base (MIB)
d. Network Management Application (NMA)
Ans: D
15 A network management system is designed to view the entire network
as a _______architecture
a. Single
b. Unified CO5 BT1
c. Structured
d. Unstructured
Ans: B
16 Management Information Base(MIB) is a collection of related
_________ objects
a. Managed
b. Structed CO5 BT1
c. Standard
d. Temporary
Ans: A
17 MIB is a collection of groups of objects that can be managed by ___
a. SMTP
b. UDP CO5 BT1
c. SNMP
d. TCP/IP

Ans: C
18 A topology that is responsible for describing the geometric arrangement
of components that make up the LAN.
a. Complex
b. Physical CO5 BT1
c. Logical
d. Incremental

Ans: B
19 A term that refers to the way in which the nodes of a network are linked
together.
a. Network
b. Topology
c. Connection CO5 BT1
d. Interconnectivity

Ans: B
20 _______WAN can be developed using leased private lines or any other
transmission facility
a. Hybrids
b. Peer-to-peer CO5 BT1
c. Two-tiered
d. Three-tiered
Downloaded by Durga Devi P ([email protected])
lOMoARcPSD|15963275

Ans: B
21 Multiplexing technique that shifts each signal to a different carrier
frequency
a. FDM
b. TDM CO5 BT1
c. Both FDM & TDM
d. None of the mentioned

Ans:A
22 _______ LAN topology describes the possible connections between
pairs of networked end-points that can communicate.
a. Complex
b. Physical CO5 BT1
c. Logical
d. Incremental

Ans: C
23 Which of the following is a part of Network identification ?
a. Password user
b. User-ID
c. OTP CO5 BT1
d. Finger print

Ans: B
24 What is a structured Network Design Process ?

a. The system is designed in a top-down sequence.


b. A focus is placed on understanding data flows, data types, and CO5 BT1
processes that access or change the data.
c. A focus is placed on understanding the location and needs of
user communities that access or change data and processes.
d. A logical model is developed after the physical mode.

Ans: A
25 Which of the following is not a source of packet delay in network
design ?
a. Processing
b. Queuing CO5 BT1
c. Transmission
d. Packaging
Ans: D
PART B (4 Marks)
1 Discuss the Network Design and Planning CO5 BT2

2 Explain the Traffic Generators in NMS CO5 BT1


3 Describe about the Traffic Generators. CO5 BT2
4 What is topology architecture and brief about the type of topologies? CO5 BT1
5 Explain the concept of Data collection CO5 BT2
6 Define Queuing Essential. How it is effect in Loss and Delay. CO5 BT2

Downloaded by Durga Devi P ([email protected])


lOMoARcPSD|15963275

7 Explain briefly about data generation. CO5 BT2


8 What is the network design for enterprise network? CO5 BT1

PART C (12 Marks)


1 List out and explain the basic types of network data collection CO5 BT2
methods
2 Discuss the Network Design Process in detail CO5 BT1
3 Explain the Network Design Management Architecture with Graphs CO5 BT2
and Link.
4 Describe about performance analysis of Network Design CO5 BT2
Management and Design Techniques.
5 Explain about the process of network management design and data CO5 BT2
collection.

Downloaded by Durga Devi P ([email protected])

You might also like